General
-
Target
d944c39f34ef4bf74e4d08eb5e4f2c8b_JaffaCakes118
-
Size
180KB
-
Sample
241209-mz8klavpav
-
MD5
d944c39f34ef4bf74e4d08eb5e4f2c8b
-
SHA1
b2871afdeb9ef2bd77167f5b7192060107bed455
-
SHA256
d942d49fb0b341de8b60047a3f75fda66d3a3eff8cf06bac3b812041273d61f3
-
SHA512
0cbbad314c66a5585c7449b567fa51aeba38b7fd4d3a605bb98905a3e0ce6ec006f0f68192bfe1bed230b8d925bfff0676b583b38c2e2d1bc5ae5244229769d4
-
SSDEEP
3072:M3vtETGUfzQ6/aFsvrrtFFliZ5pmFrzPRiXYO2oLmyAzZKO6QIbxbbo:drzQjFsTrtFFliZcHptOmrKiuxo
Static task
static1
Behavioral task
behavioral1
Sample
d944c39f34ef4bf74e4d08eb5e4f2c8b_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d944c39f34ef4bf74e4d08eb5e4f2c8b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
d944c39f34ef4bf74e4d08eb5e4f2c8b_JaffaCakes118
-
Size
180KB
-
MD5
d944c39f34ef4bf74e4d08eb5e4f2c8b
-
SHA1
b2871afdeb9ef2bd77167f5b7192060107bed455
-
SHA256
d942d49fb0b341de8b60047a3f75fda66d3a3eff8cf06bac3b812041273d61f3
-
SHA512
0cbbad314c66a5585c7449b567fa51aeba38b7fd4d3a605bb98905a3e0ce6ec006f0f68192bfe1bed230b8d925bfff0676b583b38c2e2d1bc5ae5244229769d4
-
SSDEEP
3072:M3vtETGUfzQ6/aFsvrrtFFliZ5pmFrzPRiXYO2oLmyAzZKO6QIbxbbo:drzQjFsTrtFFliZcHptOmrKiuxo
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-